Security Blog

Feature development & monitoring tips

Category: Technical Blogs

January 10, 2020

Masquerade, cracking hashes with known formats

As a penetration tester, cracking hashes can be a great post exploitation activity for both the fun and value to a client, providing a great way of showing the severity of an issue (but mostly for the fun). In this blog I’ll show you an in-depth look at cracking hashes with known formats.

Find Out More
July 18, 2019

Windows IPv6 – Part One

We are all aware of IPv6 but are we aware of the current threats associated with default configurations? What is the new threat landscape with IPv6? Should we turn a blind eye and hope it disappears? In this blog series I’ll cover the most relevant IPv6 details and attacks over a 2 part series.

Find Out More
June 17, 2019

Help Me, Git. You’re My Only Hope.

Git is a great Version Control System, we all probably use it everyday without thinking what else it can be used for apart from version control. With some plugins, a few extra commands and the use of one or two tools, it can improve your development skills and general day-to-day working life.

Find Out More